Exam Sim Questions Flashcards

Review Observed Exam Questions

1
Q

You want to ensure that the sender of the message or network transmission is authenticated, and not an imposter or a phishing attempt. What method provides the highest level of origin authentication?

A

AES-CCMP (Advanced Encryption Standard)(Counter Mode with Cypher Block Chaining Media Access Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You use a computer on a TCP/IP network to transfer data through well-known TCP port 80. Which protocol is most likely being used to transfer data?

A

HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer A needs the IP address of Computer B, but Computer A only knows Computer B’s FQDN. Where is this information found?

A

Forward Zone [FQDN = Fully Qualified Domain Name]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which attack directs user traffic to a malicious web site without any outside communication from an attacker?

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are documenting the network layout for your company. You have discovered a firewall that has two network interfaces. Which firewall architecture have you discovered?

A

dual-homed firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are the network administrator for a healthcare organisation. Recently several federal and state government laws hav been enacted which will affect network operations. Which change management documentation should record this information?

A

Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company needs to be able to provide employees access to a suite of application. However, you do not want the employees to install a local copy of the applications. What method should you use to deploy the suite of applications?

A

SaaS (Software as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are concerned about malware and workstation security, and you do not want users to use USB flash drives to export or import files. You also have no need for Telnet or FTP services. What should you do to increase security on your systems?

A
  • Disable device ports
  • Disable unnecessary services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should a business with a main office downtown use to communicate with various offices in nearby suburban locations?

A

MAN (Metropolitan Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via email. What is the issue?

A

VLAN mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next?

A

Connect to the network and try to transfer a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have been hired as a consultant for the medium-sized business. As part of your duties, you need to make recommendations on changes to the network. You decide that you want to install agents on the network devices to monitor network traffic and record the behaviour of network components. You will then use the statistical data that is gathered to make your recommendations. Which standard should you deploy?

A

SNMP (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For a new office space, you have been asked to choose a best cost solution for providing wireless network access for up to 60 employees. Your boss has informed you that there will be a mix of 802.11n and 802.11ac devices in use. The maximum distance from WAP to any user is 150ft (46M). Which kind of wireless access point should you buy?

A

802.1n the maximum indoor range is 230ft (70m) where as 802.11ac is only 115ft (35M)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prior to deploying a new wireless access point at a retail store that is located in a strip mall, you decide to perform a site survey. What is the purpose of doing this?

A
  • to calculate the number of access points required for the coverage area
  • to find the frequency and power settings to be used on access points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to deploy 802.1x authentication that supports client-side digital certificates for authentication with access points. Which technology should you deploy?

A

EAP-TLS (Extensible Authentication Protocol with Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You install a second NIC in your Linux computer. Then you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0 . What command should you issue at a command prompt to configure the NIC?

A

ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which statement is true of a network based intrusion detection system? (NIDS).
a) an NIDS generate a finite number of alarms
b) An NIDS does not analyse realtime information
c) a NIDS cannot detect an intruder who is logged on to a host computer
d) an NIDS is active while gathering data over the network

A

c) a NIDS cannot detect an intruder who is logged on to a host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You have been hired as a network administrator for a large corporation. This network includes a large number of switches that must be identically configured. In the past this information has been configured manually. You want to automatically propagate the VLAN information to all switches on the LAN. What should you use?

A

802.1q VTP
To automatically propagate VLAN information to all switches on the LAN you should use VLAN Trunking Protocol (VTP) which is also referred to as 802.1q.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You have decided to implement ISAKMP. What is provided by this technology?

A

A protocol that works with IPSec to establish a secure session.
Internet Security Association and Key Management Protocol (ISAKMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What attack involves the use of multiple computers with the purpose of denying legitimate access to a critical server?

A

distributed denial-of-service (DDOS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your company is building a new facility, and you are tasked with designing the new network at that site. You will need multiple servers, switches, patch panels, UPS equipment and other equipment. You need to plan and document the placement of the equipment in the site’s network data centre. Which tool should you use?

A

Rack Diagrams - rack diagrams depict the placement of network equipment such as: routers, switches, hubs, patch panels, servers and more in a standard 19” wide cabinet called a rack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network?

A

Collisions - an excessively high number of collisions occurring for a sustained length of time can cause delays and slow throughput. CSMA/CD will negotiate standoff timers to allow multiple devices to communicate on congested network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network?

A

VoIP-PSTN gateway -These devices establish the routing of calls to the existing PSTN network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You administer your company’s network, which is connected to the internet. A firewall is configured between the company network and the internet. You want to prevent users on the internet from using HTTP to connect to computers on the company network. Which well-known TCP port should you block to prevent internet users from entering the company’s network on that port?

A

80 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Workstation A4 and A5 were recently added to the network. Since the clients have been added, the network has been running very slowly. Which two conditions could be causing the problem?

A
  • A connector is loose
  • The bus network might be missing a terminator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You are explaining the function of a multi-layer switch to several junior administrators. On which data can multi-layer switches make routing decisions?

A
  • Port number
  • IP address
  • MAC address
  • Protocol
    A multi-layer switch operates at Layers 2, 3, 4 of OSI model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You have reconfigured your network to change the cable type used on one of your subnets from Cat5 to Cat6. Which change configuration management documentation should you revise?

A

-Network Baseline
- Physical Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You have been handed a document that details the steps to take to update the network drivers. What type of change management document do you have?

A

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which DSL technology provides the highest data rate?
a) SDSL
b) HDSL
c) ADSL
d) VDSL

A

Very high data rate Digital Subscriber Line (VDSL) provides the highest data rate at 51 to 55 megabits per second over cable lengths of up to 1000ft or 300 metres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An employee shows you a web site that publishes the SSIDs and passwords for private wireless networks in your area. The information on your company’s wireless network is included. Of which type of attack is this an example?

A

War Chalking. Originally occurred when hackers wrote SSID and security information on the side of buildings. This attack has steadily evolved to the point where hackers are now publishing this information on websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You have been hired as the network administrator. The company’s network consists of several subnetworks located in various locations across the southeast United States. You want to deploy switches across the different locations so that you can implement virtual local area networks (VLANs). What is the primary benefit of this implementation?

A

Users can be grouped by their work functions, by shared applications or protocols, or by department, regardless of their geographical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A user is complaining about wireless connectivity. Their cubicle is on a concrete wall, and the wireless access point in mounted on the other side of the wall. What describes what is happening to the wireless signal that only has to travel a few inches?

A

Absorption - occurs when an object does not reflect or refract a wireless signal, but rather absorbs a portion of it. Different materials have different absorption rates, concrete high, drywall low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Users are unable to log in to the network. When you examine the authentication server, you see that CPU usage is almost 100%. What is most likely the issue?

A

Unresponsive Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy?

A

Mesh - A mesh topology in wireless networks only requires one access point to be physically connected to the wired network where as in a traditional wireless network each access point must be physically connected to the wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You are setting up a 10-Mbps SOHO network at a residence. What is the lowest category or level of UTP cable that you should use as transmission medium for small LAN communication in the 10-Mbps range?

A

Category 3 - Although you could use Category 3 or Category 5 cable for the LAN, Category 3 is the lowest category cable that you could use for the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Your company has recently leased the office next door to the one currently being used. Both offices will be used. The current office has a Cat 6 network installed. The new office has a fibre network installed. You need to connect the networks of the two offices. Which device should you use?

A

Media Converter - Media converters work on the Physical layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You are deploying a virtual private network (VPN) for remote users. You want to meet the following goals:
- The VPN gateway should require the use of Internet Protocol Security (IPSec)
- All remote users must use IPSec to connect to the VPN gateway
- No internal hosts should use IPSec
Which IPSec mode should you use?

A

host-to-gateway - in this configuration, the VPN gateway requires the use of IPSec for all remote clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the result of your actions?

A

Network device will now operate in full-duplex mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You are the network administrator for an organisation whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation?

A

Cost - OSPF is a link-state routing protocol which uses cost as a metric for optimal path calculation. It is an open standard protocol based on Dijkstra’s Shortest Path First (SPF) algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You need to copy the traffic from a single port to a different port, but prevent bidirectional traffic on the port. Which switch feature should you use?

A

Port Mirroring - Copies traffic from a single port to a different mirror port, but prevents bidirectional traffic on the port. It allows you to view all of the traffic for a single VLAN, no matter the switch where the traffic originates. Local port mirroring only uses ports from the same switch. Remote port mirroring uses ports from multiple switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which mitigation technique reduces the attack profile of a device or network?

A

Role Separation - involves dividing server duties amongst two or more servers to reduce an attack profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

An employee has just relocated to the New York office, after working in Paris for the past five years. Both offices use DHCP to issue IP addresses. She brought her company laptop with her. The laptop was issued in Paris. As she is settling into the new office, she is not able to connect to the network. What is the most likely cause of her problem?

A

Duplicate MAC addresses - can be caused by MAC address spoofing or by manufacturers reusing MAC addresses in their devices. Manufacturers will often ship NICs with duplicate MAC addresses to different geographic areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The network administrator has changed the IP address of several servers on the network. Now a user named Jim is unable to connect to file shares on those servers using the computer name. You need to run the appropriate command(s) on Jim’s computer to resolve the problem

A

ipconfig /flushdns - All you need to do is flush the contents of the clients computers DNS cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which action would you perform to look for candidates for exploitation across an information system?

A

Vulnerability Scanning - looks for areas that are candidates for exploitation (weak spots) in networks, operating systems, applications and equipment. Vulnerability scans can also identify the effectiveness of in-place systems designed to prevent those exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy?

A

PAT - Port Address Translation provides port address translation. When using PAT you are able to share a single public IP address among multiple computers on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which component of a computer use policy should state that the data stored on a company computer is not guaranteed to remain confidential?

A

No exception of privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A company procedure calls for using IPv4 and IPv6 loopback addresses as part of the troubleshooting process. What is the purpose of this tool?

A

To provide an IP address for testing the local IP stack without a physical network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A user reports that she cannot print from her computer. You also notice that they are unable to reach a supplier’s website. The operating system is Windows 8.1. Which command should you start with to help with your diagnosis?

A

ping - allows you to test the connection between a local computer and a node on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A suburban office location for your company is located next door to a regional airport, where a US government regional weather radar system is also housed. You are tasked with setting up a wireless 802.11ac network in that location. You must select a range of 80MHz channels, some devices on that network have 802.11n wireless interfaces. Which channels should you choose?

A

Channels 36-48, Channels 149-161 - all 802.11n and 802.11ac client devices support use on these two bands. Channels 52-64 reserved for weather radar systems. Channels 100-144 also government weather radar systems and do not work with older 802.11n client devices. Channel 165 is only 20MHz wide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

You need to deploy a fibre distribution panel for datacenter, remote office, or local area network use. Which of the following are NOT important for such uses?
a) Support for SFP+
b) Bulkhead adapters and receptacles
c) Cable Storage
d) Cable Splices
e) Support for GBIC connectors
f) Cable termination

A

a) Support for SFP+ and e) Support for GBIC connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Technicians have recently reported to you that the type of lighting in your company’s building can affect the network communication. What type of lighting is in the building?

A

Fluorescent lighting fixtures - emit high levels of EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which connection type allows for connections of up to 44.736Mbps?

A

T3 - The T-carrier system and E-carrier system offer several different levels of connections:
T1 = 1.544Mbps, 650ft, UTP/STP/Coaxial
T3 = 44.736Mbps, 450 ft, Coaxial
E1 = 2.048Mbps, 650ft, UTP/STP/Coaxial
E3 = 34.368Mbps, 450 ft, Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is typically used to conceal the nature of a social engineering attack?

A

Believable language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500m fibre cable with a small service loop and suspects it might be the cause of the outage. What is most likely the issue?

A

Maximum cable length exceeded - On a 10GBase-SW network the maximum cable length is 300m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

As a network administrator you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function?

A

Physical - Active hubs or multiport repeaters amplify or regenerate signals to all other ports on the hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which suppression methods are recommended for a fire in a facility that involves paper, laminates, and wooden furniture?

A

Soda Acid, Water - Soda acid removed the fuel while water reduced the temperature this combination are used to extinguish class A fires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which type of intrusion detection system (IDS) relies upon a database that contains the identities of possible attacks?

A

signature-based IDS - watches for intrusions that match a known identity or signature, must be updated to remain effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

You have been hired as a contractor to implement a small office home office (SOHO) network for a small business. While gathering the requirements and constraints regarding the network, you decide to implement two subnets on the network. What are the reasons for implementing subnets on an IP network?

A
  • to reduce congestion by decreasing network traffic
  • to increase network security
  • to expand the network
  • to reduce CPU use
  • to isolate network problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

You are designing a network for a new facility. The client wishes to provide main connection to several floors from where the ISP service enters the building. On each floor switches will handle the distribution to end devices. What would be the most helpful for maintaining and documenting those main connections?

A

IDF/MDF documentation - Intermediate Distribution Frame/Main Distribution Frame documentation first describes and details the primary ISP feed into the building, which is handled by the MDF. IDF/MDF Documentation also shows how the MDF splits out and feeds the various IDFs throughout the facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

You are investigation possible unauthorised access to a Windows Server 2008 computer. The first step in your company’s investigation policy states that the current network connections must be documented. Which command should you use?

A

netstat - displays incoming and outgoing connections, routing tables and network interface statistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which of the following can use RFID to identify the location of the object?
a) Key Fobs
b) Biometrics
c) Locks
d) Asset tags

A

d) Asset tags - also referred to as asset tracking tags can be labels with barcodes or QR codes, or can include radio frequency identification (RFID) chips that provide electronic tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which media-access method does the 802.11 standard specify for wireless networks?

A

CSMA/CA - Carrier Sense Multiple Access/Collision Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

You have installed a new MAU on your Token Ring network because the old one is no longer supported by the product vendor. At what layer of the OSI model does this device operate?

A

The Physical Layer - A Multistation Access Unit (MAU) is a network connection concentrator used on Token Ring networks. Similar to a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

You need to obtain the current protocol statistics and port connections for Windows and UNIX/Linux computers. Which tool should you use?

A

netstat - Netstat is a TCP/IP utility that you can use to determine the computer’s inbound and outbound TCP/IP connections. It displays current connections and their listening ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

You have decided to implement a firewall between your company’s network and the internet. What does a firewall software solution typically provide?

A
  • IP proxy services
  • Packet Filtering
  • HTTP proxy services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the internet. Upon troubleshooting the problem you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the internet. What is causing this?

A

The computers are configured to operate in ad hoc mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

You are analysing communication over your network. You have captured all the packets sent to and from a server on your network. You need to filter the packet capture to only IMAP4 protocol communications. Which port does this protocol use?

A

TCP port 143 - Internet Message Access Protocol is an internet protocol for e-mail retrieval. IMAP4 works at the application layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

your company needs to deploy a wireless network to allow users to connect to the network using mobile devices. You are concerned that the radio signal will not cover the amount of area you need. Another technician instructs you to research the angle of radiation of the wireless access point’s antenna. Which term is used to refer to this?

A

Beamwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

You use a computer named Wkst1 on a TCP/IP network which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur and several data packets are lost during transmission. What will most likely occur as a result of losing packets during transmission?

A

The protocol will drop the packets, The application will automatically retransmit the packets when it detects UDP has dropped packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What technology implements packet tagging in a LAN?

A

CoS - Class of Service implements packet tagging in a local area network. It tags the different types of traffic, such as video streaming or VoIP. the tag is a value between 0 and 8, with 0 being the highest priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the purpose of a pointer (PTR) DNS record?

A

It maps an hostname to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which option is a critical metric in preventive maintenance that would allow you to schedule the replacement of a component at a convenient time, as opposed to waiting for the component to fail at an inopportune time?

A

MTBF - Mean Time Between Failures is the average, or mean time between failures on a device or system. It is an expression of reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

You need to implement Spanning Tree Protocol to prevent network loops when more than one path can be used. Which two devices could you deploy?

A

Switches, Bridges - use STP to prevent loops in the network. STP uses Spanning Tree Algorithm (STA) to help a switch or a bridge by allowing only one active path at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which RADIUS implementation was created to deal with Voice over IP(VoIP) and wireless services?

A

Diameter was created to deal with VoIP and wireless services. It was created to address new technologies that RADIUS was not deigned to handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

While designing your network architecture, you decide to configure multiple VLANs to a router within your network. You are aware that having multiple VLANs on a single router will not be feasible to manage. What should you do to help mitigate this problem?

A

Implement sub-interfaces on your routers. Sub-interfaces are used to help manage multiple VLANs within a router and facilitate intercommunication with each other. A sub-interface can be configured virtually on a router or switch so that each device connected to a VLAN appears under the same IP address, causing the IP address to act as a default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

To improve security you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change users report that they cannot access any web sites hosted by Web1 by using their fully qualified domain names (FQDNs). however they can access other web sites that are hosted on other web servers by using their FQDNs. What is causing this problem?

A

The new web address starts with https instead of http, users are most likely attempting to access via http:// instead of https://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

You want to enable port authentication on your network switches. On which setting is port authentication based?

A

MAC address - Port authentication on your network switches is based on the switch’s MAC address. If the switch is not specifically configured with a MAC address, the MAC address communication is not allowed through the switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

The network administrator has changed the IP address of several servers on the network. Now a user named Jim is unable to connect to file shares on those servers using the computer name. You need to run the appropriate command(s) on Jim’s computer to resolve the problem

A

ipconfig /flushdns - all you need to do is flush the contents of the client computer’s DNS cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Your Windows 7 computer is located on a TCP/IP network that uses DHCP. You want your computer to release its lease on the TCP/IP configuration that it received from the DHCP server. Which command should you issue to release the configurations?

A

The ipconfig command with /release to release your computer’s lease on the TCP/IP configuration that it received from the DHCP server. If other computers cannot locate your computer on the network then you might need to renew the DHCP lease for your TCP/IP configuration which would use /renew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which protocol is NOT capable of preventing a man-in-the-middle attack? HTTPS, SSH, rsh, IPSec?

A

rsh - Remote Shell protocol is used to log onto remote computers and can be easily exploited by a man-in-the-middle attack (MITM) because it neither provides encryption nor authentication of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Your company has decided to implement an acceptable use policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit for management approval. What is defined in this policy?

A

How users are allowed to employ company hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which protocol is categorised as an Exterior Gateway Protocol (EGP)?

A

BGP - Border Gateway Protocol is used between autonomous networks. BGP is an algorithm to determine the quickest route between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What provides both authentication and authorisation using UDP?

A

RADIUS - Remote Authentication Dial-in Service was originally designed for dial-up networking and validates the credentials of a remote user against a stored database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

You have reconfigured your network to change the cable type used on one of your subnets from cat5 to cat6. Which change configuration management documentation should you revise?

A

Physical Network Diagram, Network Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which type of network would be set up in an office for computers and mobile devices that do NOT comply with the company’s NAC policies?

A

Quarantine network - A NAC server would hold the policies that would control access to the network. If computers or mobile devices did not have the appropriate security controls configured, they would be placed on the quarantine network to isolate them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which is NOT associated with data conversion between the ISP and the customer premises equipment? ATM, Demarcation point, CSU/DSU, Smart Jack?

A

Asynchronous Transfer Mode (ATM) is NOT associated with data conversion between the ISP and the customer premises equipment. It is a network transmission model used in voice, video and data communications. ATM uses equally sized cells that are all 53 bytes long. The equal length of the data packets supports very high data rates. ATM is deployed in Optical Carrier (OC) backbone network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

You are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the WAN. They were able to access the entire WAN earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the WAN. You have been able to gather information about the problem, duplicate the problem, question the users and adequately establish the symptoms of the problem. What should you do next?

A

Establish what has changed -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which of the following options are relevant to network segmentation when using switches? Tagging and untagging ports, Mac address tables, VLANs, ARP tables?

A

Tagging and untagging ports, VLANs - VLANs allow you to segment a network and isolate traffic to different segments. VLANs are created by tagging and untagging ports on a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Currently your company uses IPv4 across its enterprise. Your company is considering using IPv6 instead of IPv4. Which improvements does IPv6 provide over IPv4?

A

The IP header options allows more efficient forwarding and less rigid length limits, Some header fields have been dropped or made optional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

You are setting up your company’s VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which possibilities do you want to eliminate first?

A

The call terminates on an analog endpoint - If one call terminates on an analog endpoint, occasional audio problems are inevitable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

You have been hired as a contractor to implement a small office home office (SOHO) network for a small business. While gathering the requirements and constraints regarding the network you decide to implement two subnets on the network. What are valid reasons for implementing subnets on an IP network?

A

To increase network security, To reduce congestion by decreasing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

A company procedure calls for using the IPv4 and IPv6 loopback addresses as part of the troubleshooting process. Which explanation best represents the purpose of this tool?

A

To provide an IP address for testing the local IP stack without a physical network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

You a re a network administrator for a company that maintains LANs in Los Angeles and Paris. You want to use PPTP to create a VPN connection between the LAN in Paris and the LAN in Los Angeles. A PPTP server has been configured on each LAN. Which protocol should you use to establish a connection between the PPTP servers?

A

PPP - Point-to-Point Protocol should be used to establish a connection between the Point-to-Point Tunneling Protocol (PPTP) server in Las Angeles and the PPTP server in Paris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

You have recently been hired by a company as its network administrator. Currently, all service packs and security updates are deployed directly to the computers and applications that need them. Last month this resulted in a server outage of four hours because of a bug in a security update. Management wants to prevent issues with any future updates. You need to recommend a solution to this problem. What recommendation should you make?

A

Deploy a test lab - all service packs and other updates will be deployed in the test lab first. If they do not cause any issues you can then deploy the service packs or updates in the live environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which device or feature provides a bridge between the physical environment and the virtual environment?

A

Virtual NIC - In common practice it is bridged to the physical NIC on the host system so the virtual machine can communicate with another network segment or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which suppression methods are recommended for a fire in a facility that involves paper, laminates and wooden furniture?

A

Soda acid, Water -Soda acid removes the fuel while water reduces the temperature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Management has asked you to ensure that any traffic through the external firewall is allowed as long as it is the result of a previous connection. Which type of firewall performs this assessment when it first encounters traffic?

A

stateful firewall - When traffic is encountered a stateful firewall first examines a packet to see if it is the result of a previous connection. Information about previous connections is maintained in the state table

98
Q

You are a system administrator. A user calls you complaining that he cannot log on to the network. What are two questions you should ask first when troubleshooting the problem?

A

Are other users also experiencing the same problem? - you will know if this is a network problem or a problem with the user’s logon process. Can the problem be duplicated? - If the problem cannot be duplicated it could be an intermittent problem or it could be something simple such as the user typing his password incorrectly

99
Q

You connect a home computer to a BRI ISDN line. The Bandwidth On Demand Interoperability Group (BONDING) protocol is used to combine the channels. What is the maximum data transfer rate of the B channels?

A

128Kbps - Each B channel in a Basic Rate Interface (BRI) Integrated Services Digital Network (ISDN) can provide a maximum data transfer rate of 64Kbps. A BRI ISDN line provides two bearer (B) channels which can be combined by the bonding protocol

100
Q

Your company’s networking team wants to deploy 10-Gigabit Ethernet (10GbE) over fibre optic cables for its core or backbone network segments. Which types of transceivers are they most likely to plug directly into their switches, routers and server network adapters?

A

SFP+ (Small Form-factor Pluggable Plus) - As data rates increase to 10Gbps and beyond networks make increasing use of fibre optic cables to convey the signals necessary to encode and transport the huge volumes of information involved.

101
Q

What is the advantage of using wireless bridges over E1/T1 leased lines?

A

Wireless bridges support higher bandwidth than E1/T1 - E1/T1 lines tend to be more expensive in the long term. Wireless bridges provide connectivity between two geographically separated LANs.

102
Q

Your company is located in Charlotte, North Carolina. Management has decided to deploy multiple 802.11a WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?

A

twenty-three - Each 802.11a channel utilises a RF bandwidth of 20MHz in Orthogonal Frequency Division Multiplexing (OFDM) modulation. This 20 MHz channel is split into 52 channels with 300KHz smaller sub-carriers, out of which 48 are used for data transmission. The eight non-overlapping channels can be used in a single area or cell to provide the cell a total bandwidth up to 532Mbps

103
Q

You install a network analyser to capture your network’s traffic as part of your company’s security policy. Later you examine the captured packets and discover that the only packets that were captured are from Subnet 1. You need to capture packets from all 4 subnets on your network. Two routers are used on your network. What could you do? (2 answers)

A

Install a distributed network analyser, Install the network analyser on all four subnets

104
Q

You are designing a network for a new facility. The client wishes to provide main connections to several floors from where the ISP service enters the building. On each floor, switches will handle the distribution to end devices. What would be the most helpful for maintaining and documenting those main connections?

A

IDF/MDF documentation - Intermediate Distribution Frame/Main Distribution Frame documentation first describes and details the primary ISP feed into the building which is handled by the MDF. The documentation also shows how the MDF splits out and feeds the various IDFs throughout the facility. Most often an IDF will provide network service to a floor or department

105
Q

You have been hired as a network security consultant. The company that hires you had multiple incidents where their wireless network has been breached by hackers. You find out that they have a RADIUS authentication server that they use for the corporate VPN. You decide to recommend using RADIUS authentication for the wireless network. Which WPA version should you suggest?

A

WPA-Enterprise - requires the use of a RADIUS authentication server and is intended for large networks. Also referred to as WPA-802.1x

106
Q

Your company wants to implement a WLAN. You are researching the different wireless options and want to implements the WLAN technologies that are least affected by multipath distortion. Which WLAN transmission technologies are least affected by multipath distortion?

A

802.11g & 802.11a - Multipath distortion is caused by the reflection of radio frequency (RF) signal on surfaces while traveling between transmitter and the receiver. Also known as inter-symbol interference

107
Q

Which term is most commonly used to describe equipment that creates a demilitarised zone (DMZ)?

A

firewall - A DMZ is a zone located between a company’s internal network and the Internet that usually contains servers that the public will be accessing. Usually two firewalls are used to create a DMZ. One firewall resides between the public network and DMZ and another firewall resides between the DMZ and private network.

108
Q

You have been asked to implement a Voice over Internet Protocol (VoIP) on your company’s network. Which protocol should you use?

A

SIP - Session Initiation Protocol is an Applications layer protocol, Real-time Transport Protocol (RTP) is another protocol used in VoIP

109
Q

Which RADIUS implementation was created to deal with Voice over IP (VoIP) and wireless services?

A

Diameter - It was created to address new technologies that RADIUS was not designed to handle.

110
Q

While designing an IPv6 addressing scheme for your network, you decide to use EUI for the host portion of each node’s address. You need to derive a 64-bit EUI address for the hosts on your network as part of the overall IPv6 address for each node. What should you do?

A

Use the host’s MAC address with FFFE inserted in the middle, and invert the seventh most significant bit in the MAC address -

111
Q

You need to display protocol statistics and connections using NetBIOS for a Windows computer. Which utility should you use?

A

Nbtstat - displays NetBIOS over TCP/IP statistics on Windows computers. Use Nbstat to perform the following: Track NetBios over TCP/IP, Show details of incoming and outgoing NetBIOS over TCP/IP connections, Resolve NetBIOS names

112
Q

You have decided to implement frame tagging in a port-based switching network. What does this technique ensure?

A

That a single VLAN can be distributed across multiple switches

113
Q

Your wireless network has come under attack in recent weeks. A technician suggests that you implement 802.1x security instead of 802.11 WEP security in the wireless network. What is the advantage of using 802.1x security over 802.11 WEP security?

A

802.1x security generates dynamic encryption keys -

114
Q

You are replacing a SFP fibre cable. You decide to use an SFP+ cable because one is available. The cable fits in the ports, but you lose connectivity. What is the most likely culprit?

A

Transceiver mismatch - occurs when you have a fibre connector plugged into the wrong type fibre port

115
Q

You need to determine the reliability of a network segment. Which metric would help you?

A

Error rate - a metric/tool that can be used to indicate the reliability of the network, expressed as a percentage.

116
Q

Your company operates a fleet of panel trucks, each with a built-in cellular base station for voice and data communications. You are required to upgrade the wireless equipment used in 18 vehicles. You do not want to install obsolete equipment. What cellular technology is most likely to be obsolete?

A

TDMA - Time Division Multiple Access is obsolete. A 2G technology decommissioned in 2007-2009

117
Q

You have recently moved several servers that contain confidential information onto a DMZ. What is the most likely valid reason for doing this?

A

Compliance with federal and state regulations

118
Q

You have a subnet that contains a computer with the IP address 172.16.5.2/23. You need to send a message to every computer on the network where that computer resides. Which subnet is that IP address a member of, and what is the broadcast address for that subnet?

A

subnet: 172.16.4.0, broadcast: 172.16.5.255 - The valid host range is between 172.16.4.1 and 172.16.5.254

119
Q

A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy?

A

PAT - Port Address Translation provides port address translation, this is based on the port numbers. When using PAT you are able to share a single public IP address among multiple computers on the same network

120
Q

Which mitigation technique reduces the attack profile of a device or network?

A

Role separation - involves dividing server duties amongst two or more servers to reduce an attack profile

121
Q

Which of these devices or functions works at Layer 7? Content filter, VoIP gateway, VoIP PBX, NGFW?

A

A Next Generation Firewall (NGFW) works at the application layer (Layer 7).

122
Q

You are hired to manage the network at a large data centre. On your first day a user reports that they have lost network connectivity. At the user’s workstation, you successfully ping 127.0.0.1 and then swap out the patch cable that runs from the computer to a blank wall plate. In the network closet you notice that all four patch panels were mounted to the rack after the punchdowns were completed but nothing indicates port assignments or which areas the patch panels serve. You end up resolving the issue but it takes longer than necessary. You want to speed up the resolution of future connectivity issues. What should you prepare FIRST?

A

Labeling - Patch panel ports should be labeled and wall jackets should be labeled with the corresponding port number on the patch panel. The patch cable should have the same labeling. Switches, routers, hubs and wireless access points should be labeled as well as each piece of equipment in a server rack.

123
Q

You want to configure a firewall and filter packets on a Linux system. Which command would you use?

A

iptables - filtering can be performed using packet type, packet source/destination or target.

124
Q

You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security to protect against wireless attack. However you must provide support for older wireless clients. Which protocol should you choose?

A

WPA - designed to work with older clients while implementing the 802.11i standard, was created to fix core problems with WEP

125
Q

Your company has a main office and three branch offices throughout the United States. Management has decided to deploy a cloud solution that will allow all offices to connect to the same single-routed network and thereby connect directly to the cloud. Which of the following is the BEST solution? Client-to-site VPN, MPLS VPN, Site-to-site VPN, P2P?

A

MPLS VPN - Multiprotocol Label Switching Layer 3 Virtual Private Network. This will allow all offices to connect to the same single-routed network and connect directly to the cloud

126
Q

What is the most common form of identification and authentication?

A

user identification with reusable password

127
Q

Users on your network have access to the internet. As more users access the internet bandwidth starts to diminish causing web pages to load slowly. After looking at the web server logs you noticed that many of the same web sites are being accessed by multiple users. What should you do to improve your company’s internet bandwidth?

A

Implement a HTTP proxy server - frequently accessed files are placed on the cache of this server

128
Q

You have two wireless networks in your building. The wireless networks do not overlap. Both of them use Wifi Protected Access (WPA). You want to ensure that no unauthorised wireless access points are established. What should you do?

A

Periodically complete a site survey

129
Q

You need to deploy a fibre distribution panel for datacenter, remote office or local area networking use. Which features are NOT important for such uses?

A

Support for GBIC connectors, Support for SFP+ - These two options represent connectors used at endpoints, such as routers, switches and network interfaces. NOT connectors or functions present in FDPs themselves. FDPs generally offer Cable termination, Bulkhead adapters and receptacles, Cable splices and Cable storage

130
Q

You need to collect management information on the routers and switches used on your company’s network. You decide to use SNMP. What is the name of the software component that runs on a managed device when you deploy this technology?

A

SNMP agent - runs on a managed device such as a router or a switch and collects management information.

131
Q

Your organisation has several VLANs implemented on its network. The VLANs operate across several switches. What do all users on a VLAN have in common?

A

Broadcast Domain - VLAN assignment is configured at the switch for each device that is connected to the device. VLANs enable many users at many locations to be in the same broadcast domain. VLANS span multiple collision domains, subnets and cable segments so users would not have these aspects of the network in common

132
Q

You have installed a new MAU on your token ring network because the old one is no longer supported by the product vendor. At what layer of the OSI model does this device operate?

A

The Physical Layer - An MAU is a network concentrator used on token ring networks. An MAU is similar to a hub, which is a network connection concentrator used on star-wired ethernet networks.

133
Q

A new user is reporting a “Destination Host Unreachable” message. What is the most likely culprit?

A

Incorrect Gateway - Make sure the local machine and the default gateway are on the same subnet. If what is entered as the gateway IP address is actually the IP address of the LAN side of your router, you will see a “Request Timed Out” message.

134
Q

You are explaining the TIA/EIA 568A and 568B wiring specifications to a new employee. Which wiring pins contain the same colours across both specifications?

A

Pin 4, Pin 5, Pin 7, Pin 8

135
Q

Which of the following relies on credentials stored and authenticated on the device being used? Certificates, Local Authentication, Kerberos, RADIUS?

A

Local Authentication - the credentials are stored on the device being used (local device), not on a remote server. Local authentication is accomplished by the user providing credentials (typically a user name and password) and verifying those credentials against a local database

136
Q

You need to configure IPSec to digitally sign and encapsulate each packet within another packet. What should you implement?

A

AH protocol in tunnel mode - Internet Protocol Security (IPSec) can be used in tunnel mode with the Authentication Header (AH) protocol to digitally sign and encapsulate each packet sent from the network within another packet. A Tunnel is a network communications construct that transports encapsulated packets.

137
Q

Your company’s security policy states that passwords should never be transmitted in plain text. You need to determine if this policy is being followed. which tool should you use?

A

protocol analyser - captures packets as they are transmitted on the network. If a password is transmitted in plain text you will be able to see the password in the packet. Also called network analysers or packet sniffers

138
Q

An administrator would like to integrate DNS and DHCP so that each is aware of changes in the other. Which of the following would be the best method for him to do this?

A

IPAM - IP address Management allows integrations of DNS and DHCP so that each is aware of the changes in the other. IPAM allows for the discovery of servers associated with an IP address infrastructure responsibilities on the network and the ability to manage those servers from a central point

139
Q

What is the purpose of a pointer (PTR) DNS record?

A

It maps an IP address to a hostname

140
Q

What are the advantages that a spine-and-leaf network architecture has over the traditional three-tiered network architecture?

A

Lower Latency, Increased capacity, Higher Scalability - Also allows for equal cost multipath (ECPM) instead of spanning tree protocol (STP) to prevent pathways from being oversubscribed while still preventing network loops

141
Q

Your company periodically exchanges confidential information with a third party via a single server at each company. Management has recently become concerned that communications between the two servers have been intercepted and read. You have been asked to ensure that messages between the two authenticated computers are encrypted to prevent attackers from reading the messages. Which protocol should you use?

A

TLS - Transport Layer Security encrypts the messages transmitted between two authenticated computers, preventing third parties from reading the messages. TLS is the protocol being used when Secure Sockets Layer (SSL) is implemented. TLS works at the transport layer

142
Q

Your company has decided to implement unified communication. You have been asked to implement a VoIP network. You need to connect the VoIP network to your company’s PBX. What should you implement?

A

UC Gateway - a unified communication (UC) gateway connects VoIP to your private branch exchange (PBX). Unified communications include VoIP, video, real-time services, quality of service (QOS) and UC devices.

143
Q

Which device can be used to divert incoming web traffic to specific servers based on its content?

A

Load Balancer

144
Q

Your Ipv6 host uses Stateless Address Autoconfiguration (SLAAC). How does it install a default IPv6 route?

A

Router Advertisement - When a device that uses both IPv4 and IPv6 joins a network, it sends a router solicitation (RS) messuage using ICMP to contact the local IPv6-capable router on the network. The local router is turned into the all-router’s multicast group address which is ff02::2, and will receive the RS message. The router immediately answers with a routing advertisement (RA) message using ICMP to all nodes on the network. This uses the all nodes multicast group address which is ff02::1

145
Q

The company network that you administer has four LANs: accounting, receiving, shipping and development. Each LAN is connected to the other LANs by a router. The user of the computer named LeadDev on the development LAN reports that he cannot connect to a computer named DevServ, which is also on the development LAN. The user of a computer named Shipmaster on the shipping LAN reports that she can connect to the DevServ computer. Which situation is the most likely cause of the connectivity problem? The router is defective, The Shipmaster computer has a faulty NIC, The network cable is disconnected from the NIC on the LeadDev computer, The NIC in the DevServ computer is defective?

A

The network cable is disconnected from the NIC on the LeadDev computer - Because the Shipmaster computer can connect to the DevServ computer, the communication path between these two computers is functioning normally. This path includes the NIC on the Shipmaster computer, the router between the shipping and development LANs, and the NIC on the DevServ computer.

146
Q

You are designing a SOHO network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the network?

A

1000BaseCX - supports a data transmission rate of 1 Gigabit per second over 150-ohm balanced copper cable. Supports a maximum cable segment length of only 25m. Designed to support connections between network nodes that are in close proximity such as nodes in the wiring closet.

147
Q

Your company wants to allows remote users to access their Windows network remotely if their network is not connected to the internet. What should you implement?

A

RAS - Remote Access Service is a service provided by Windows that allows remote access to the network via a dial-up connection

148
Q

Your company is researching different wireless antennas. Antennas that you research are high-gain antennas. What is a property of high-gain antennas?

A

High-gain antennas provide a small vertical beamwidth - Antennas with higher gain have less beamwidth than antennas with lower gain. The high-gain antennas have very narrow beamwidth. For example typical 6-dBi patch antenna has a 65-degree beamwidth but the 21-dBi parabolic dish antenna has a 12-degree radiation pattern.

149
Q

Which network device would be MOST likely found within an office building setting? Industrial Control Systems (ICS), SCADA systems, Smart Speakers, HVAC systems?

A

HVAC systems - can be found in almost all settings due to their universal usage. HVAC systems are designed to handle heating, ventilation and air conditioning within a building.

150
Q

What is another term for a demilitarised zone? (DMZ)

A

screened subnet - Two firewalls are used in this configuration, one between the public network and DMZ and one between the DMZ and private network.

151
Q

You need to perform some administrative maintenance on a Cisco router. you decide to connect your notebook computer to the console port on the router. Which type of cable should you use?

A

Rollover cable - You should use a rollover cable (also called a console cable) to connect to the console port on any Cisco device.

152
Q

You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues you discover that the network has low throughput. what is the most likely cause of delay on this network?

A

Collisions - Collisions on an Ethernet CSMA/CD network are normal and generally do not cause any negative effect. In fact they are required for proper operation. An excessively high number of collisions occurring for a sustained length of time can cause delays and slow throughput. CSMA/CD will negotiate standoff timers to allows multiple devices to communicate on congested network segments.

153
Q

Your organisation has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is authenticated?

A

TGT - Ticket-Granting-Ticket. To ensure tickets expire correctly, clock synchronisation is used in Kerberos authentication. A client is granted a TGT from an Authentication Server (AS) which is sometimes referred to as a ticket granting server (TGS). The client then sends its TGT to a Key Distribution Centre (KDC) and the KDC sends a session key to the client.

154
Q

Employees must use a combination photo identification and security key card to enter a company office building. What is a secure method of determining whether an employee who lost a key card should be allowed to enter the office building?

A

Place digitised photographs of the employees in employee records

155
Q

You must propose a cabling scheme for your company’s new location. Several departments are located on the same floor with a maximum distance of 61m between departments. You want a relatively easy, low-cost installation with simple connections. Which type of cabling would you propose?

A

Twisted-Pair - the least expensive cabling media. Mass produced and widely available. Max length of 100m

156
Q

You have several computers in your network that are located behind a firewall. The computers are unable to obtain a dynamic IP address from the DHCP server. You suspect that the firewall is configured to block the DHCP traffic. which port must be open on the firewall to allow the traffic?

A

UDP port 67 - Dynamic Host Configuration Protocol transmits dynamic IP address assignment, it is considered a connectionless protocol.

157
Q

While working as an IT technician you receive multiple complaints of network outages occurring. After investigating you conclude that there are incomplete files resulting in mismatching data values. what type of interface error has occurred here?

A

A CRC error - A cyclic redundancy check error occurs when a damaged or incomplete file causes the checksum value not to match the CRC value. These errors often occur when compressed files or archives are extracted but can also occur when reading and writing to local and external hard disks or other external media. The purpose of CRC is that it will check files and other data sites to ensure that there have been no changes to any raw data.

158
Q

You manage a network for your organisation. The network contains one DNS server and three routers. you are setting up a new DHCP server. You configure seperate scopes for each subnet on your network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? (2 answers)

A

Configure the DNS server as a server option, Configure each router as a scope option for its appropriate scope - each scope will have a different router or default gateway. For this reason router or default gateway information must be configured at the scope level. If you configure this option at the server level all the clients would receive the same router configuration, which would not work because you have three different subnets.

159
Q

Your company owns a single physical server. You need to ensure that Web services are hosted in a Linux environment while Active Directory services are hosted in a Windows environment. In addition you need to ensure that these services are hosted on different broadcast domains. What should you do?

A

Implement virtual servers and switches - allows you to host a Linux environment for Web services and a Windows environment for Active Directory services on the same physical server. Implementing virtual switches will allows you to host the services on a different broadcast domains.

160
Q

You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the web request load equally. What should you do?

A

Implement an active/active cluster - also known as a load-balancing cluster.

161
Q

What is a physical barrier that acts as the first line of defense against an intruder?

A

A fence - Fencing acts as the first line of defense against casual trespassers and potential intruders, but fencing should be complimented with other physical security controls such as guards and dogs to maintain the security of the facility

162
Q

You have changed the IP address scheme for two of your company’s networks. In addition the names of two servers have changed. Which change management documentation should you revise?

A

Physical Network Diagram - includes cable lengths and types, IP addresses, server roles, network equipment locations and number of network users. LOGICAL NETWORK DIAGRAMS DO NOT INCLUDE SERVER NAMES AND IP ADDRESSES

163
Q

You need to provide terminal emulation and remote login capability for one of the servers on your network. Which process/application layer protocol should you use?

A

Telnet - is a user command and an underlying TCP/IP protocol for accessing remote hosts.

164
Q

You have decided to implement frame tagging in a port-based switching network. What does this technique ensure?

A

That a single VLAN can be distributed across multiple switches

165
Q

You are investigating possible unauthorised access to a Windows Server 2008 computer. The first step in your company’s investigation policy states that the current network connections must be documented. Which command should you use?

A

netstat - displays incoming and outgoing connections, routing tables and network interface statistics

166
Q

You need to assign a virtual IP address to an internet server. What are valid reasons for doing so? (3 answers)

A
  • To permit multiple servers to share the same address
  • To eliminate host dependencies on specific, individual network interfaces
  • To permit the same address to access multiple domain names
167
Q

What requires a user to complete an action, such as digitally signing an AUP, prior to accessing the network?

A

Captive Portal - Captive portals are web pages, typically used in public networks, where users must complete some action before that are granted access to the network. Commonly seen in coffee shops, hotels and airports

168
Q

You have decided to implement ISAKMP. What is provided by this technology?

A

A protocol that works with IPSec to establish a secure connection - Internet Security Association and Key Management Protocol

169
Q

Which DNS record type includes SPF and DKIM records?

A

TXT - contains human readable text and are designed to help with fraudulent phising emails. The Sender Policy Framework (SPF) record within the TXT record helps filter out emails that are spoofed to appear as if they are coming from your domain. SPF looks at the IP address of the last SMTP server and verifies that the IP address and SMTP server match. Domain Keys Identified Mail (DKIM) validates that an email sent from a domain was authorised by the owner of the domain.

170
Q

Which is a security implication if your company uses a public cloud deployment?

A

Other tenants can gain physical access to the resources that store your company’s data

171
Q

Your network contains a DHCP server. While performaing routine maintenance you discover that the DHCP server has the following types of options configured: server options, scope options, reserved client options and class options. which of these types of options takes precedence?

A

Reserved client options -

172
Q

You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment the accounting department is flooding the network with a high volume of data which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department?

A

Bridge - provides a quick and low-cost solution for dividing a network into different segments for the purposes of reducing network traffic. Bridges work by building routing tables based on MAC addresses. These routing tables enable bridges to determine which packets need to pass through the bridge to another segment, versus which packets should stay on the local segment.

173
Q

You need to define which protocols are allowed to traverse the router, whether the traffic is inbound or outbound, Which should you use? Distributed switching, Access control lists, Packet switching, Software-defined networking?

A

Access control lists - An access control lists (ACL) allows you to define which types of traffic are allowed into or out of the network on a protocol-by-protocol basis. ACLs can also be configured based on port number, MAC address, IP address and other crtiteria.

174
Q

You originally configured a redundant server with a static IP address and it has been offline for some time. When you power the server up to perform some tests what might be an unexpected consequence?

A

Duplicate IP addresses

175
Q

You need to implement a data centre for your company. In this data centre you plan to implement inter-rack connections that are limited to 25m. Which Ethernet standard should you implement?

A

1000Base-CX - designed for wiring closets, transmission rate of 1000Mbps and maximum segment length of 25m

176
Q

Which feature provides varying levels of network bandwidth based on the traffic type?

A

QoS - Quality of Service

177
Q

The owner of a coffee shop wants you to install a wireless network for employees and customers to increase the shop’s business. He is not tech-savvy and cannot understand why you want to change a WEP setting, even though you tell him it is not secure enough. What feature of WEP can you explain in lay terms that will help him understand?

A

Shared or open authentication - were the two insecure methods of authentication under WEP. Under Shared Key Authentication (SKA) all of the clients used the same key, making the key very vulnerable to being cracked. Like giving everyone a set of keys to the business
- An open wireless network does not require any form of authentication key which is like leaving the front door open

178
Q

What are three characteristics of a client-server network?

A
  • More stable and secure connections
  • Lengthy access time for a service
  • Less expensive network hardware
179
Q

An administrator would like to integrate DNS and DHCP so that each is aware of changes in the other. Which would be the best method for him to do this?

A

IPAM - IP Address Management allows integration of DNS and DHCP. IPAM allows for the discovery of servers associated with an IP address infrastructure responsibilities on the network and the ability to manage those servers from a central point.

180
Q

Which malicious software relies on other applications to execute and infect the system?

A

A virus - The main criterion for classifying a piece of executable code as a virus is whether it spreads itself by means of hosts. The host could be any application or file on the system. A virus infects a system by replicating itself through application hosts. Viruses usually include a replication mechanism and an activation mechanism designed with a particular objective in mind. Viruses usually spread via infected disks, through email or via infected programs

181
Q

Your company wants to use the private Class B network designation of 172.17.0.0/20. You have been asked to divide it up into six subnets. Two subnets should have 512 nodes and four more subnets have 256 nodes already established. While a total of 2,048 IP addresses are needed the design should leave some room for growth in each subnet. What is the correct way to subnet this network?

A

Allocate two networks with /22 masks, and the remaining four with /23 masks

181
Q

You are explaining the TIA/EIA 568A and 568B wiring specifications to a new employee. Which wiring pins contain the same colours across both specifications?

A

Pin 4, Pin 5, Pin 7, Pin 8

182
Q

What is the main purpose of a VPN concentrator?

A

To terminate the VPN tunnels

183
Q

You have been hired as a new network administrator for your company. In your first week you discover a device that uses a security policy to filter and examine packets coming into a network to determine whether to forward the packet to its destination. This device is not depicted on the company’s network layout diagram. Which device is this?

A

Firewall - uses security policies

184
Q

You will have a very small wiring closet for your routers. While the company will use fibre-optic cabling, you would like to use the smallest form of connector to conserve space. The connector you plan to use should be roughly half the size of the other connectors. Which fibre-optic connector should you use?

A

LC - A Lucent Connector fibre-optic connector is roughly half the size of the other fibre-optic connectors. Its smaller form allows for more space in the wiring closet.

185
Q

Users are reporting internet connectivity issues. After researching you discover that the routing protocols in use on your network are experiencing routing loops. You must prevent this from happening. What should you do?

A

Implement split horizon - Split horizon route advertisement prevents routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned

186
Q

You have been asked to create several TIA/EIA 568A wiring cables for your network. Which colour wire should be placed in Pin 1?

A

Green/White

187
Q

You have decided to implement 802.1q. What does this standard do?

A

It implements VLAN Trunking - It allows traffic from all VLAN to cross a single cable between two switches. If 802.1q was not implemented each seperate VLAN would require its own port connection

188
Q

You want to allow remote users to access their Windows network remotely if their network is not connected to the internet. Which of the following should you implement?

A

RAS - Remote Access Service is a service provided by Windows that allows remote access to the network via dial-up connection. In order to obtain a remote connection two services need to be in place: RAS and dial-up networking (DUN). The server that will establish the remote connection needs to have RAS so that it can link to the remote computer. The remote computer needs to have DUN so that it can connect to the remote server.

189
Q

You have been asked to research the different firewall types and make recommendations on which type(s) to implement on your company’s network. You need to document how the firewalls affect network performance. which type of firewall most detrimentally affects network performance?

A

Application-level proxy firewall - it requires more processing per packet.

190
Q

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a CISCO router so that you are able to identify the network points where packets are being dropped. Which command should you use to accomplish this task in the most efficient manner?

A

traceroute - finds the path a packet takes while being transmitted to a remote destination. Also used to track down routing loops or errors in a network

191
Q

You need to support an online meeting application that primarily transports streaming video packets. Occasional dropped packets are less important than minimising latency. Which transport layer protocols should you deploy?

A

DTLS - Datagram Transport Layer Security is essentially a reimplementation of TLS which uses order-preserving TCP at the transport layer. DTLS uses the UDP protocol at the transport layer instead of TCP

192
Q

Which metric is used by the Routing Information Protocol (RIP) Version 2 to determine the network path?

A

Hop Count

193
Q

After a data breach occurs at a clients site, you determine that some of the switches, routers and servers in the network were updated with the most current security patches, and some have never been updated. When you examine the network diagram you notice that many of the same types of devices do not look the same in the diagram. What type of documentation should you provide to the client to ensure all devices are consistently identified by their type?

A

Diagram symbols - should be standardised throughout the documentation

194
Q

You suspect there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI network layer to allow this?

A

Logical Network Addressing

195
Q

Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system?

A

A diversity antenna system avoids multipath distortion

196
Q

To improve your ability to monitor and manage your network devices your network requirements call for purchasing devices that support out-of-band (OOB) management. Which type of interface or device is most likely to satisfy this requirement as you select switches, routers, firewalls and servers for purchase?

A

Serial Port - A serial port easily and regularly plays host to a modem which provides a dial-up link that network admins can use to access the device to which it is attached. The whole idea of OOB is to use a seperate communications link outside the scope and reach of the regular network. An OOB link provides a way to access a device even when the network is down or when the device needs to be powered up after a power fault or interruption.

197
Q

Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide?

A

Baselines

198
Q

Your company is considering converting to the use of IPv6 addresses.. What are the three types of IPv6 addresses?

A

Anycast, Unicast, Multicast

199
Q

What provides both authentication and authorisation using UDP?

A

RADIUS - Remote Authentication Dial-in User Service was originally designed for dial-up networking and validates the credentials of a remote user against a stored database

200
Q

Your company has decided to implement an acceptable use policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit for management approval. What is defined in this policy?

A

How users are allowed to employ company hardware

201
Q

You have been given a drawing that shows the flow of communication in your network, with symbols to indicate each piece of equipments function. Which configuration management documentation have you been given?

A

Physical Network Diagram - includes flow of network communication and symbols to indicate equipment function. Uses connecting line to show the physical layout of the devices in the network

202
Q

Which system or device detects network intrusion attempts and controls access to the networks for the intruders?

A

IPS - Intrusion Prevention System is an improvement over an intrusion detection system (IDS) because an IPS actually prevents intrusion

203
Q

You have been asked to implement a VoIP on your company’s network. Which protocol should you use?

A

SIP - Session Initiation Protocol, application layer protocol, allows you to transmit audio and video messages over a TCP/IP network

204
Q

You have been hired as a network consultant by a company. You discover that the network’s signal strength greatly weakens as traffic travels over the network medium due to absorption and scattering. What is the term for this tendency?

A

Attenuation - the term for a loss of signal strength as data travels over the network medium, also referred to as decibel (dB) loss

205
Q

Your company’s networking team wants to deploy 10-Gigabit Ethernet (10GbE or 10 Gbps Ethernet) over fibre optic cables for its core or backbone network segments. Which of the following types of transceivers are they most likely to plug directly into their switches, routers and server network adapters?

A

SFP+

206
Q

You are working with a company that has a fast ethernet 100Base-TX network. You will be adding several new network segments to the current network. Which standards apply to this company’s network?

A
  • Two pairs of wires with a Cat5 UTP cabling
  • 100Mbps data transmission rate
  • Maximum segment length of 100m
207
Q

Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. For meetings while working out the partnership agreement your company’s 6 top-level executives must be able to connect to the partner’s network quickly and reliably. Support for voice, data and imaging transmissions and a dedicated 24 hr link are required. your solution must be as inexpensive as possible while providing enough bandwidth for your company’s top-level executives. What should you implement?

A

T1 - T1 lines can provide fast, digital connections of up to 1.544 Mbps, transmitting voice, data and video. A T1 line also provides a dedicated connection which means that it provides a 24hr link. A T1 line is more expensive that a dial-up connection using Plain Old Telephone Service (POTS) or an Integrated Services Digital Network (ISDN) connection but this company needs enough bandwidth to accomodate 6 executives which justifies the cost. If the full bandwidth of the T1 line proves too costly or unnecessary, fractional T1 is available. With fractional T1 you can subscribe to one or more of the channels at a lower cost

208
Q

Which media-access method does the 802.11 standard specify for wireless networks?

A

CSMA/CA - Carrier Sense Multiple Access/Collision Avoidance (like CSMA/CD for ethernet)

209
Q

Which RADIUS implementation was created to deal with VoIP and wireless services?

A

Diameter

210
Q

You need to implement a wireless network for a client. You have two 802.11a, two 802.11b and two 802.11g wireless access points. You need to implement three wireless networks that can communicate with each other. Which wireless access points should you use?

A

The 802.11b and 802.11g wireless access points - These two standards operate at the 2.4Ghz frequency and can be used interchangeably

211
Q

You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix the issue?

A

Install another wireless access point that uses a different non-overlapping channel and the same SSID

212
Q

Which technology or device would be best suited for implementing short-ranged fibre-optics?

A

CWDM - Coarse wavelength Division Multiplexing (CWDM) is a WDM system best for short-ranged fibre-optic transmission because it uses fewer than 8 active wavelengths per fibre. Employs wide-range frequencies with wavelengths that are far apart. CWDM is a compact and cost-effective option when spectral efficiency is not a requirement. (DWDM for long range, 6 wavelengths)

213
Q

You are troubleshooting a computer that has the IP address of 192.22.14.42. To which network class does the IP belong?

A

Class C - Class C addresses range from 192 to 223 decimal
[
Class A - 0 -126
Class B - 128-191
Class C - 192 -223
Class D - 224 - 239
Class E - 240 - 255
]

214
Q

You need to create an encrypted remote terminal connection with a UNIX computer. Which protocol should you use?

A

SSH - Secure Shell is used to create an encrypted remote terminal connection with a UNIX computer, secure alternative to Telnet

215
Q

You want to enable port authentication on your network switches. On which setting is port authentication based?

A

Port authentication on your network switches is based on the switch’s MAC address. If the switch is not configured with a MAC address the MAC address communication is not allowed through the switch port.

216
Q

Your company’s IT department needs to provide field engineers with remote GUI-based access to their in-office desktop PCs over the internet. Engineers could use Windows, Linux, iOS and Android on their remote devices with a mix of MacOS and Windows on the in-office desktops. Which remote access tools offer the best no-cost option?

A

VNC - Virtual Network Computing products are widely and freely available for Windows, OS X, Linux, Android, iOS and Chrome. Many VNC products are easy to set up and use, interoperate among multiple versions and work well through corporate and personal firewalls. Best no-cost option

217
Q

Name three characteristics of a client-server network

A
  • More stable and secure connections
  • Less expensive network hardware
  • Lengthy access time for a service
218
Q

you need to determine the length of a network cable. Which device should you use?

A

a TDR - Time Domain Reflectometer. Sends an electric pulse through a cable and measures the time required for the pulse to return

219
Q

Currently your company uses IPv4 across its enterprise. Your company is considering using IPv6 instead of IPv4. Which improvements does IPv6 provide over IPv4?

A
  • The IP header options allow more efficient forwarding and less rigid length limits
  • Some header fields have been dropped or made optional
220
Q

You need to implement an independent network within your private LAN. Only users in the research and development department should be able to access the independent network. The solution must be hardware based. Which type of network should you deploy?

A

A Virtual Local Area Network (VLAN) can be used to ensure that internal access to other parts of the network is controlled and restricted. Created using a switch. VLANs provide a layer of protection against sniffers and can also decrease broadcast traffic. Creating a VLAN is much simpler than using firewalls or implementing a virtual private network (VPN)

221
Q

You are investigating possible unauthorised access to a Windows Server 2008 computer. The first step in your company’s investigation policy states that the current network connections must be documented. Which command should you use?

A

netstat - displays incoming and outgoing connections, routing tables and network interface statistics

222
Q

You have installed a new MAU on your Token Ring network because the old one is no longer supported by the product vendor. At what layer of the OSI model does this device operate?

A

Multistation Access Unit operates at the Physical layer (Layer 1). An MAU is a network connection concentrator used on star-wired Ethernet networks

223
Q

Your company wants to upgrade its twister pair (TP) cable network to handle up to 10GB data rates from switches to network nodes over lengths of up to 90m. Which TP category type must the company deploy to meet its requirements?

A

Cat6a makes better use of conductors and shielding to support the nominal 100m distances for data up to 10Gbps.

224
Q

For your current deployment you need an antenna with 360 degrees radiation in the horizontal plane to use for point-to-multipoint WLAN deployment. Which type of antenna should you deploy?

A

Omnidirectional antenna

225
Q

You are documenting the network layout for your company. You have discovered a firewall that has two network interfaces. Which firewall architecture have you discovered?

A

Dual-Homed Firewall - One interface connects to the public network the other to the private network

226
Q

You are installing a second wireless access point in your office. When you place the second wireless access point you notice it is experiencing interference intermittently. You want to prevent the interference. What are three methods to prevent interference?

A
  • Move the new wireless access point
  • Change the channel used on the new wireless access point
  • Decrease the signal strength of the new wireless access point
227
Q

What provides the communication framework for data transfer in a storage area network (SAN) while minimising costs?

A

iSCSI - Internet Small Computer Systems Interface protocol is used in SANs, LANs, WANs and the internet. Allows SCSI commands to transmit over an IP network

228
Q

Which device or feature provides a bridge between the physical environment and the virtual environment?

A

Virtual NIC

229
Q

You are asked to acquire address space for a new network that must accomodate at least 12 subnets each with at least 2,048 nodes. A total of 25,576 IP addresses are needed but the available address space should leave some room for growth in each subnet, and for the number of subnets to double (or more). The network must also support IPsec to the endpoints for security reasons. Which option provides the best fit while minimising costs?

A

IPv6 network with a /56 global routing prefix - little or no cost to obtain, provides 256 subnets each with millions of nodes and supports IPsec end to end. In a situation where IPsec is needed end-to-end only IPv6 makes sense

230
Q

You are implementing an 802.11g wireless network in your office. What is the maximum number of wireless access points that you can implement within 30m of each other?

A

Three - The 802.11g wireless access points only have three non-overlapping channels 1, 6, 11

231
Q

Which technology is widely used in home automation, such as smart lights, locks and thermostats?

A

Z-Wave - A wireless technology that creates a wireless mesh network with a primary controller. Each device communicates with its nearest neighbour much like routers communicate with each other.

232
Q

Your company is located in Atlanta, Georgia. Management has decided to deploy multiple 802.11b WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?

A

Three - 1, 6, 11

233
Q

You are about to install wireless access points in different areas of the building. You want maximum coverage so you opt for the longer-range 2.4 Ghz frequency. What should also be of concern?

A

Channel Overlap - Can cause performance issues. 11 channels are available in US but there is a high degree of overlap.

234
Q

Your company uses a single global IP address that maps to the company’s local IP addresses. When requests are sent from the internal network to destinations outside the company, those requests are mapped from the IP address of the local host that made the request to the global IP address. Which term describes this process?

A

Network Address Translation (NAT)

235
Q

You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with SONET network. Which of the following should you implement?

A

10GBase-SW - for use with Synchronous Optical Networking (SONET) networks.

236
Q

In PKI what is the entity that signs a certificate?

A

An Issuer - Signing a certificate verifies that the name and key in the certificate are valid. PKI is a system designed to securely distribute public keys. PKI typically consists of the following: certificates, a key repository, a method for revoking certificates and a method to evaluate a certificate chain

237
Q

Which of the following can be manipulated to reduce network traffic? lower TTL, NTP, increased lease time, MAC reservations?

A

Lease time can be manipulated to reduce network traffic. Lease time for Windows is 8 days but lease times may be adjusted. If the network configuration seldom changes you might consider increasing the lease time. Every lease must be renewed and those renewals increase network traffic

238
Q

What are three advantages that a spine-and-leaf network architecture has over the traditional three-tiered network architecture?

A
  • Higher scalability
  • Increased capacity
  • Lower latency
239
Q
A